With the network border blurry at best, we no longer have a single and convenient point of telemetry collection to force the attacker in the open....
The adversary is changing its tools to avoid detection while attacking the vulnerabilities governments issue warnings about. The Russian hacker group behind the historic SolarWinds intrusion...
Having succeeded in passing a number of their recommendations through the last National Defense Authorization Act, the commissioners plan to embrace an oversight role as they...
Air Force Chief Software Officer Nicolas Chaillan and industry experts explain how Platform One is eliminating barriers to entry for DevSecOps teams. Pockets of software expertise...
Cloud service providers hoping to secure authorizations to operate at multiple agencies simultaneously got some more time to make a business case for their prioritization by...
At the beginning of March, Microsoft discovered some zero-day vulnerabilities in its Exchange Servers were actively exploited by a hacking group known as Hafnium. Since then,...
The agency recognized benefits such as enabling remote work but notes the inherent risks and costs of putting industrial control system components online. Given recent intrusions,...
Cyber threats have the potential to impact the power grid in a similarly serious manner. Uncharacteristic winter weather recently sent the Texas power grid into overdrive,...
A recent attempt by hackers to poison the water supply in a Florida town prompted calls for more resources. The Biden administration threw its weight behind...
The agency aims to be “more aggressive” in searching for network protections. The Federal Aviation Administration is working on a new IT contract for managing its...
Recent Comments